Beyond the Perimeter: Uncovering Hidden Data Exfiltration Threats in Google Cloud Platform

This talk explores various covert methods attackers use to exfiltrate data from Google Cloud Platform resources with minimal detection, highlighting the importance of advanced security measures.

SANS Cloud Security•252 views•30:50

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Singapore under the topic 'itoto system 12'.

About this video

In this talk, we will discuss the numerous ways attackers can steal data from Google Cloud Platform (GCP) resources with minimal chance of detection. It explores five different methods an attacker can use to exfiltrate data in the popular services: Google Cloud Storage, Cloud SQL and BigQuery. For each method we will describe the generated log events and what to look for to detect malicious behavior. We will finish with a summary of the key takeaways and next steps for attendees: Data exfiltration from Google Cloud Platform (GCP) resources is a serious threat that can result in significant data breaches and other security incidents. Understanding the various methods of exfiltration and how to detect them is critical for effective incident response and security management. GCP audit logs are an essential tool for detecting data exfiltration and other security incidents in the cloud environment. By analyzing the audit logs, security professionals can identify suspicious activities, detect potential breaches, and take appropriate action to prevent further damage. To prevent data exfiltration in GCP resources, organizations must take a proactive approach to security. This includes implementing access controls, monitoring the audit logs for suspicious activities, and configuring alerts for potential security incidents. By following these best practices, organizations can reduce the risks of data exfiltration and better protect their sensitive data in the cloud. SANS CloudSecNext Summit 2023 Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform Speaker: Or Aspir View upcoming Summits: http://www.sans.org/u/DuS

Video Information

Views
252

Total views since publication

Likes
4

User likes and reactions

Duration
30:50

Video length

Published
Nov 28, 2023

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.